CVE-2025-14097
Remote Code Execution Vulnerability in Radiometer Analyzer Software
Publication date: 2025-12-17
Last updated on: 2025-12-17
Assigner: Radiometer
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| radiometer | application_software | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the application software of multiple Radiometer products. It may allow remote code execution and unauthorized device management if certain internal conditions are met. Exploitation requires a remote connection and additional information obtained through other means. The issue is due to a weakness in the analyzer's application software, and it affects devices with the remote support feature enabled.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to remote code execution and unauthorized management of the affected Radiometer devices. This means an attacker could potentially control the device remotely, impacting confidentiality, integrity, and availability of the device and its data.
What immediate steps should I take to mitigate this vulnerability?
Immediate steps include removing the affected Radiometer analyzer from the network if the network is not considered secure. Additionally, ensure that the network is secure and that access follows best practices. The remote support feature should be disabled or controlled to prevent exposure.